UTunnel VPN and ZTNA Features
What are the features of UTunnel VPN and ZTNA?
Usage
- Multi-Device Usage
- Multiple Concurrent Connections
- Protocol Choices
- Unlimited Bandwidth
- No Log Storage
- Varied Server Locations
- Unlimited Server Switches
Miscellaneous
- Live Customer Support
- Multiple Payment Methods
Top Rated UTunnel VPN and ZTNA Alternatives
UTunnel VPN and ZTNA Categories on G2
Filter for Features
Usage
Multi-Device Usage | Enables the use of the VPN on multiple Devices. 12 reviewers of UTunnel VPN and ZTNA have provided feedback on this feature. | 96% (Based on 12 reviews) | |
Multiple Concurrent Connections | Allows use of the VPN on multiple connections at the same time. 11 reviewers of UTunnel VPN and ZTNA have provided feedback on this feature. | 97% (Based on 11 reviews) | |
Protocol Choices | Based on 14 UTunnel VPN and ZTNA reviews. Enables the user to choose which protocol to use such as OpenVPN or PPTP. | 94% (Based on 14 reviews) | |
Unlimited Bandwidth | As reported in 12 UTunnel VPN and ZTNA reviews. Provides unlimited bandwidth for the user. | 93% (Based on 12 reviews) | |
No Log Storage | Based on 11 UTunnel VPN and ZTNA reviews. Does not keep logs of user activity. | 94% (Based on 11 reviews) | |
Varied Server Locations | Provides servers in many different locations. This feature was mentioned in 13 UTunnel VPN and ZTNA reviews. | 97% (Based on 13 reviews) | |
Unlimited Server Switches | Enables you to switch between servers an unlimited number of times. This feature was mentioned in 11 UTunnel VPN and ZTNA reviews. | 94% (Based on 11 reviews) |
Miscellaneous
Live Customer Support | Provides live customer support. 13 reviewers of UTunnel VPN and ZTNA have provided feedback on this feature. | 90% (Based on 13 reviews) | |
Open Source Code | Enables the user to view the code used by the VPN. | Not enough data | |
Multiple Payment Methods | As reported in 10 UTunnel VPN and ZTNA reviews. Allows multiple payment methods such as credit card or cryptocurrency. | 92% (Based on 10 reviews) |
Data
Data Protection | Enable users to protect their data from potential outside attacks. | Not enough data | |
Remote Access | Allow users to control access to their information from a central point. | Not enough data | |
Network Access | Allow users to implement policies for controlling access to their business's infrastructure. | Not enough data |
Network
Security | Secure access to your network for both guests and internal users | Not enough data | |
Scaling | Scale network visibility to whatever your businesss requires. | Not enough data | |
Audit | Audit your network's assets. | Not enough data |
Logistics
Processes | Enable users to implement various processes. | Not enough data | |
Blockage | Ability to block unwanted outside access. | Not enough data | |
IoT | Track all IoT assets. | Not enough data |
Network Management
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data | |
Security Analytics | Utilizes behavioral analysis to improve security procedures and documentation. | Not enough data | |
API/Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Security
Security Automation | Allows administrative control over automated security tasks. | Not enough data | |
Application Security | Protects application access and data. Prompts additional authentication for suspicious users. | Not enough data | |
Workload Protection | Protects computing resources across a network. Prompts additional authentication for suspicious users. | Not enough data | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. | Not enough data |
Identity Management
Adaptive Access Control | Provides a risk-based approcach to determining trust within the network. | Not enough data | |
Identity Scoring | Calculates risk based on user behavior, permissions, and requests. | Not enough data | |
User Monitoring | Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. | Not enough data |
Protection
Policy Enforcement | Allows administrators to set policies for security and governance. | Not enough data | |
Security Audit | Allows for deep examination into network-connected devices, policies, and protocols. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data | |
User Authentication | Authenticates users prior to granting access to networks, applciations, and systems. | Not enough data |
Monitoring
Compliance Monitoring | Monitors data and compliance requirements. Sends alerts based on violations or misuse. | Not enough data | |
Vulnerability Monitoring | Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data | |
Observability | Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. | Not enough data |
Administration
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Scalability | Provides features to allow scaling for large organizations and user bases. | Not enough data | |
Global Access | Extends SDP network access to users regardless of their physical location. | Not enough data |